b2d951e | Dr. Stephen Henson | 07 April 2014, 16:55:44 UTC | Prepare for 1.0.1g release | 07 April 2014, 16:55:44 UTC |
c5993d1 | Dr. Stephen Henson | 06 April 2014, 11:59:14 UTC | Update NEWS. | 07 April 2014, 16:53:31 UTC |
5be1ae2 | Dr. Stephen Henson | 06 April 2014, 22:11:20 UTC | Return if ssleay_rand_add called with zero num. Treat a zero length passed to ssleay_rand_add a no op: the existing logic zeroes the md value which is very bad. OpenSSL itself never does this internally and the actual call doesn't make sense as it would be passing zero bytes of entropy. Thanks to Marcus Meissner <meissner@suse.de> for reporting this bug. | 07 April 2014, 16:53:31 UTC |
96db902 | Dr. Stephen Henson | 05 April 2014, 23:51:06 UTC | Add heartbeat extension bounds check. A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server. Thanks for Neel Mehta of Google Security for discovering this bug and to Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for preparing the fix (CVE-2014-0160) | 07 April 2014, 16:53:31 UTC |
0d7717f | Dr. Stephen Henson | 07 April 2014, 12:02:10 UTC | Document -verify_return_error option. (cherry picked from commit 4e6c12f3088d3ee5747ec9e16d03fc671b8f40be) | 07 April 2014, 12:04:21 UTC |
aba7600 | Andy Polyakov | 06 April 2014, 15:19:54 UTC | crypto/modes/gcm128.c: more strict aliasing fixes. (cherry picked from commit 997d1aac7cfb957decb62d8f0034a7eca6177fec) | 06 April 2014, 15:22:46 UTC |
00acdfb | Andy Polyakov | 06 April 2014, 10:50:36 UTC | vpaes-x86_64.pl: fix typo, which for some reason triggers rkhunter. (cherry picked from commit 6eebcf345933694e08aba400faf6f639fb4db196) | 06 April 2014, 10:55:22 UTC |
51624db | Dr. Stephen Henson | 05 April 2014, 19:43:54 UTC | Set TLS padding extension value. Enable TLS padding extension using official value from: http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml (cherry picked from commit cd6bd5ffda616822b52104fee0c4c7d623fd4f53) Conflicts: CHANGES ssl/tls1.h | 05 April 2014, 19:52:59 UTC |
9e29df0 | Dr. Stephen Henson | 04 April 2014, 11:46:39 UTC | Update FAQ. (cherry picked from commit 6cc0068430d0a4abdef0b466d422e6a4d154a5fe) | 04 April 2014, 12:07:22 UTC |
f54167d | Dr. Stephen Henson | 04 April 2014, 11:44:43 UTC | Use correct length when prompting for password. Use bufsiz - 1 not BUFSIZ - 1 when prompting for a password in the openssl utility. Thanks to Rob Mackinnon, Leviathan Security for reporting this issue. (cherry picked from commit 7ba08a4d73c1bdfd3aced09a628b1d7d7747cdca) | 04 April 2014, 12:07:17 UTC |
6042582 | Dr. Stephen Henson | 03 April 2014, 12:27:08 UTC | Document new crl option. (cherry picked from commit dbb7654dc189992966ecd95ca66f7a3bb011ab9b) | 03 April 2014, 12:37:11 UTC |
5052264 | Tim Hudson | 03 April 2014, 12:23:51 UTC | Add option to generate old hash format. New -hash_old to generate CRL hashes using old (before OpenSSL 1.0.0) algorithm. (cherry picked from commit de2d97cd799f38024d70847bab37d91aa5a2536e) | 03 April 2014, 12:37:04 UTC |
bfc3424 | Eric Young | 02 April 2014, 18:50:33 UTC | Fix base64 decoding bug. A short PEM encoded sequence if passed to the BIO, and the file had 2 \n following would fail. PR#3289 (cherry picked from commit 10378fb5f4c67270b800e8f7c600cd0548874811) | 02 April 2014, 18:57:27 UTC |
1c65936 | Dr. Stephen Henson | 12 March 2014, 14:43:52 UTC | update NEWS | 12 March 2014, 14:43:52 UTC |
40acdb1 | Dr. Stephen Henson | 12 March 2014, 14:35:54 UTC | Update ordinals. Use a previously unused value as we will be updating multiple released branches. (cherry picked from commit 0737acd2a8cc688902b5151cab5dc6737b82fb96) | 12 March 2014, 14:41:37 UTC |
4b7a4ba | Dr. Stephen Henson | 12 March 2014, 14:16:19 UTC | Fix for CVE-2014-0076 Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuval Yarom for supplying a fix. (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29) Conflicts: CHANGES | 12 March 2014, 14:19:54 UTC |
e0660c6 | Dr. Stephen Henson | 10 March 2014, 15:45:30 UTC | typo (cherry picked from commit a029788b0e0c19cee4007cc1f73201cf2c13addf) | 10 March 2014, 15:48:43 UTC |
b4ada74 | Dr. Stephen Henson | 07 March 2014, 19:04:45 UTC | Remove -WX option from debug-VC-WIN32 | 07 March 2014, 19:07:51 UTC |
a93d952 | Andy Polyakov | 07 March 2014, 10:02:25 UTC | engines/ccgost/gosthash.c: simplify and avoid SEGV. PR: 3275 (cherry picked from commit ea38f020492042bc1d1adc26ef197b0b9cadf968) | 07 March 2014, 10:03:51 UTC |
5b56fec | Andy Polyakov | 27 February 2014, 11:35:02 UTC | Makefile.org: mask touch's exit code [but don't let it mask make's]. PR: 3269 (cherry picked from commit 2f34088e5e9ff02ad20df50571073abac04f1431) | 27 February 2014, 11:37:08 UTC |
32171e4 | Dr. Stephen Henson | 26 February 2014, 15:28:20 UTC | Fix for WIN32 builds with KRB5 (cherry picked from commit 3eddd1706a30cdf3dc9278692d8ee9038eac8a0d) | 26 February 2014, 15:33:09 UTC |
48e6eda | Andy Polyakov | 25 February 2014, 21:21:54 UTC | ssl/t1_enc.c: check EVP_MD_CTX_copy return value. PR: 3201 (cherry picked from commit 03da57fe14f2de5bde9d4496a2ae9a4ae8879f88) | 25 February 2014, 21:24:24 UTC |
0696071 | Dr. Stephen Henson | 25 February 2014, 14:27:18 UTC | update NEWS | 25 February 2014, 14:27:18 UTC |
caf55bf | Dr. Stephen Henson | 25 February 2014, 12:11:22 UTC | Avoid Windows 8 Getversion deprecated errors. Windows 8 SDKs complain that GetVersion() is deprecated. We only use GetVersion like this: (GetVersion() < 0x80000000) which checks if the Windows version is NT based. Use a macro check_winnt() which uses GetVersion() on older SDK versions and true otherwise. (cherry picked from commit a4cc3c8041104896d51ae12ef7b678c31808ce52) | 25 February 2014, 13:42:25 UTC |
ce36310 | Andy Polyakov | 24 February 2014, 18:29:49 UTC | ms/do_win64a.bat: forward to NUL, not NUL:. Allegedly formwarding to NUL: sometimes creates NUL file in file system. PR: 3250 (cherry picked from commit 63aff3001ef6ba2ac376cd3f237fb0d0b3e77f30) | 24 February 2014, 18:33:54 UTC |
3ae1b53 | Andy Polyakov | 24 February 2014, 15:54:10 UTC | BC-32.pl: pre-1.0.2-specific refresh for Borland C. PR: 3251 Suggested by: Thorsten Sch\xf6ning | 24 February 2014, 15:54:10 UTC |
79bb005 | Andy Polyakov | 24 February 2014, 15:42:40 UTC | BC-32.pl: refresh Borland C support. PR: 3251 Suggested by: Thorsten Sch\xf6ning (cherry picked from commit 779c51c6446f384c2f2a7bd5cc4c3e0366baf628) | 24 February 2014, 15:49:10 UTC |
c4b16dd | Andy Polyakov | 24 February 2014, 14:16:56 UTC | x509/by_dir.c: fix run-away pointer (and potential SEGV) when adding duplicates in add_cert_dir. PR: 3261 Reported by: Marian Done (cherry picked from commit 758954e0d8232d370ed72b7f86640e40443e1778) | 24 February 2014, 14:23:46 UTC |
deb3b08 | Dr. Stephen Henson | 15 February 2014, 17:16:19 UTC | Add /fixed flag for FIPS links where appropriate. (cherry picked from commit c55fef76f77aa54e85ca534785b2b19cebbe940c) Conflicts: util/pl/VC-32.pl | 15 February 2014, 20:30:08 UTC |
b45b3ef | Dr. Stephen Henson | 15 February 2014, 01:27:56 UTC | Remove duplicate statement. (cherry picked from commit 5a7652c3e585e970e5b778074c92e617e48fde38) | 15 February 2014, 01:29:36 UTC |
e420060 | Kurt Roeckx | 23 December 2013, 18:45:26 UTC | Use defaults bits in req when not given If you use "-newkey rsa" it's supposed to read the default number of bits from the config file. However the value isn't used to generate the key, but it does print it's generating such a key. The set_keygen_ctx() doesn't call EVP_PKEY_CTX_set_rsa_keygen_bits() and you end up with the default set in pkey_rsa_init() (1024). Afterwards the number of bits gets read from the config file, but nothing is done with that anymore. We now read the config first and use the value from the config file when no size is given. PR: 2592 (cherry picked from commit 3343220327664680420d4068e1fbe46d2236f1b0) | 14 February 2014, 22:35:39 UTC |
d8ec8a4 | Kurt Roeckx | 23 December 2013, 18:41:28 UTC | Fix additional pod errors with numbered items. (cherry picked from commit e547c45f1c74e976656c042ec9d873f6eea0e756) | 14 February 2014, 22:35:39 UTC |
040ed7b | Scott Schaefer | 23 December 2013, 18:28:30 UTC | Fix various spelling errors (cherry picked from commit 2b4ffc659eabec29f76821f0ac624a2b8c19e4c7) | 14 February 2014, 22:35:39 UTC |
c76e5b0 | Scott Schaefer | 23 December 2013, 18:01:38 UTC | Document pkcs12 -password behavior apps/pkcs12.c accepts -password as an argument. The document author almost certainly meant to write "-password, -passin". However, that is not correct, either. Actually the code treats -password as equivalent to -passin, EXCEPT when -export is also specified, in which case -password as equivalent to -passout. (cherry picked from commit 856c6dfb09d69fc82ada2611c6cd792dfc60e355) | 14 February 2014, 22:35:39 UTC |
0071215 | Dr. Stephen Henson | 13 December 2013, 14:41:32 UTC | Backport TLS padding extension from master. (cherry picked from commit 8c6d8c2a498146992123ef5407d7ba01a1e7224d) Conflicts: CHANGES ssl/t1_lib.c | 14 February 2014, 22:19:03 UTC |
4a55631 | Dr. Stephen Henson | 13 December 2013, 14:41:32 UTC | Backport TLS padding extension from master. (cherry picked from commit 8c6d8c2a498146992123ef5407d7ba01a1e7224d) Conflicts: CHANGES ssl/t1_lib.c | 05 February 2014, 15:42:04 UTC |
19a6857 | Dr. Stephen Henson | 03 February 2014, 14:13:04 UTC | Add quotes as CC can contain spaces. PR#3253 (cherry picked from commit 7f6e09b5316928a9da24d2f695d1885a26dd38ec) | 03 February 2014, 14:14:09 UTC |
f21e6b6 | Dr. Stephen Henson | 29 January 2014, 00:59:35 UTC | Clarify docs. Remove reference to ERR_TXT_MALLOCED in the error library as that is only used internally. Indicate that returned error data must not be freed. (cherry picked from commit f2d678e6e89b6508147086610e985d4e8416e867) | 29 January 2014, 01:02:12 UTC |
e1549a0 | Dr. Stephen Henson | 28 January 2014, 15:35:16 UTC | typo (cherry picked from commit cb2182676bdf652070bc272a3896d957763a4324) | 28 January 2014, 15:36:30 UTC |
765be74 | Dr. Stephen Henson | 28 January 2014, 15:15:26 UTC | Fix demo comment: 0.9.9 never released. (cherry picked from commit 717cc8589540b95122a652dee68e6a75b6262d93) | 28 January 2014, 15:17:47 UTC |
9614d2c | Dr. Stephen Henson | 28 January 2014, 15:10:27 UTC | Check i before r[i]. PR#3244 | 28 January 2014, 15:10:27 UTC |
ad03c71 | Dr. Stephen Henson | 28 January 2014, 13:51:58 UTC | Add loaded dynamic ENGINEs to list. Always add a dynamically loaded ENGINE to list. Otherwise it can cause problems when multiply loaded, especially if it adds new public key methods. For all current engines we only want a single implementation anyway. (cherry picked from commit e933f91f50108a43c0198cdc63ecdfdbc77b4d0d) | 28 January 2014, 13:57:34 UTC |
4eedf86 | Dr. Stephen Henson | 23 January 2014, 18:36:33 UTC | Use default digest implementation in dgst.c Use default instead of ENGINE version of digest. Without this errors will occur if you use an ENGINE for a private key and it doesn't implement the digest in question. | 23 January 2014, 18:36:33 UTC |
eb85ee9 | Kaspar Brand | 16 January 2014, 13:49:38 UTC | Omit initial status request callback check. PR#3178 | 16 January 2014, 13:49:38 UTC |
fa2026d | Zoltan Arpadffy | 11 January 2014, 22:42:37 UTC | VMS fixes | 11 January 2014, 22:42:37 UTC |
fe08007 | Dr. Stephen Henson | 09 January 2014, 22:47:22 UTC | Fix bug in X509_V_FLAG_IGNORE_CRITICAL CRL handling. (cherry picked from commit 8f4077ca69076cebaca51b7b666db1ed49e46b9e) | 09 January 2014, 22:54:03 UTC |
e3ebdcf | Dr. Stephen Henson | 08 January 2014, 14:24:21 UTC | Update NEWS. | 08 January 2014, 14:24:21 UTC |
cb10cf1 | Dr. Stephen Henson | 08 January 2014, 13:39:48 UTC | Update NEWS. | 08 January 2014, 13:39:48 UTC |
c0dd71c | Dr. Stephen Henson | 08 January 2014, 13:07:20 UTC | Fix warning PR#3220 | 08 January 2014, 13:36:27 UTC |
51478be | Dr. Stephen Henson | 06 January 2014, 15:37:02 UTC | Update NEWS: removal of time in handshakes. | 06 January 2014, 15:37:02 UTC |
a7304e4 | Dr. Stephen Henson | 06 January 2014, 14:37:03 UTC | Prepare for 1.0.1g-dev | 06 January 2014, 14:37:03 UTC |
0d87763 | Dr. Stephen Henson | 06 January 2014, 14:36:07 UTC | Prepare for 1.0.1f release | 06 January 2014, 14:36:07 UTC |
197e0ea | Dr. Stephen Henson | 06 January 2014, 14:35:04 UTC | Fix for TLS record tampering bug CVE-2013-4353 | 06 January 2014, 14:35:04 UTC |
c776a3f | Dr. Stephen Henson | 06 January 2014, 13:33:27 UTC | make update | 06 January 2014, 13:33:27 UTC |
25c9fa6 | Dr. Stephen Henson | 04 January 2014, 13:50:52 UTC | Restore SSL_OP_MSIE_SSLV2_RSA_PADDING The flag SSL_OP_MSIE_SSLV2_RSA_PADDING hasn't done anything since OpenSSL 0.9.7h but deleting it will break source compatibility with any software that references it. Restore it but #define to zero. (cherry picked from commit b17d6b8d1d49fa4732deff17cfd1833616af0d9c) | 04 January 2014, 14:00:44 UTC |
d2dc33d | Dr. Stephen Henson | 02 January 2014, 19:02:28 UTC | update NEWS | 02 January 2014, 19:02:28 UTC |
f3dcc84 | Dr. Stephen Henson | 24 December 2013, 18:17:00 UTC | Don't change version number if session established When sending an invalid version number alert don't change the version number to the client version if a session is already established. Thanks to Marek Majkowski for additional analysis of this issue. PR#3191 | 02 January 2014, 15:12:48 UTC |
1c2c5e4 | Dr. Stephen Henson | 11 December 2013, 14:45:12 UTC | Don't use rdrand engine as default unless explicitly requested. (cherry picked from commit 8f68678989a198ead3ab59a698302ecb0f1c8fb1) | 22 December 2013, 16:08:01 UTC |
3462896 | Dr. Stephen Henson | 20 December 2013, 15:26:50 UTC | Fix DTLS retransmission from previous session. For DTLS we might need to retransmit messages from the previous session so keep a copy of write context in DTLS retransmission buffers instead of replacing it after sending CCS. CVE-2013-6450. | 20 December 2013, 23:12:18 UTC |
a6c62f0 | Dr. Stephen Henson | 20 December 2013, 15:12:26 UTC | Ignore NULL parameter in EVP_MD_CTX_destroy. | 20 December 2013, 22:52:41 UTC |
ca98926 | Dr. Stephen Henson | 19 December 2013, 14:37:39 UTC | Use version in SSL_METHOD not SSL structure. When deciding whether to use TLS 1.2 PRF and record hash algorithms use the version number in the corresponding SSL_METHOD structure instead of the SSL structure. The SSL structure version is sometimes inaccurate. Note: OpenSSL 1.0.2 and later effectively do this already. (CVE-2013-6449) | 19 December 2013, 21:04:28 UTC |
2ec4181 | Andy Polyakov | 18 December 2013, 20:27:35 UTC | sha512.c: fullfull implicit API contract in SHA512_Transform. SHA512_Transform was initially added rather as tribute to tradition than for practucal reasons. But use was recently found in ssl/s3_cbc.c and it turned to be problematic on platforms that don't tolerate misasligned references to memory and lack assembly subroutine. (cherry picked from commit cdd1acd788020d2c525331da1712ada778f1373c) | 18 December 2013, 22:03:03 UTC |
0294b2b | Dr. Stephen Henson | 14 December 2013, 13:55:48 UTC | Check EVP errors for handshake digests. Partial mitigation of PR#3200 | 18 December 2013, 13:26:10 UTC |
f1068a1 | Dr. Stephen Henson | 10 December 2013, 12:52:27 UTC | Get FIPS checking logic right. We need to lock when *not* in FIPS mode. (cherry picked from commit 57c4e42d7545b51cbc00015defc81db7236dc15f) | 10 December 2013, 12:54:55 UTC |
cadde46 | Dr. Stephen Henson | 10 December 2013, 00:10:53 UTC | remove obsolete STATUS file | 10 December 2013, 00:10:53 UTC |
c2bdcba | Dr. Stephen Henson | 09 December 2013, 23:55:12 UTC | Add release dates to NEWS | 09 December 2013, 23:55:12 UTC |
60df657 | Dr. Stephen Henson | 08 December 2013, 13:13:29 UTC | make update | 08 December 2013, 13:23:14 UTC |
17a2d08 | Dr. Stephen Henson | 04 December 2013, 13:39:04 UTC | Avoid multiple locks in FIPS mode. PR: 3176. In FIPS mode ssleay_rand_bytes is only used for PRNG seeding and is performed in either a single threaded context (when the PRNG is first initialised) or under a lock (reseeding). To avoid multiple locks disable use of CRYPTO_LOCK_RAND in FIPS mode in ssleay_rand_bytes. (cherry picked from commit 53142f72c9b9c9bad2f39ca6200a4f04f5c8001c) | 08 December 2013, 13:23:14 UTC |
accb300 | Andy Polyakov | 03 December 2013, 22:59:55 UTC | bn/asm/x86_64-mont5.pl: comply with Win64 ABI. PR: 3189 Submitted by: Oscar Ciurana (cherry picked from commit c5d5f5bd0fe8b2313bec844c0f80f3d49562bfa8) | 03 December 2013, 23:03:46 UTC |
b13dff6 | Dr. Stephen Henson | 27 November 2013, 15:35:56 UTC | Simplify and update openssl.spec | 27 November 2013, 15:38:04 UTC |
4ade6a8 | Andy Polyakov | 12 November 2013, 21:09:55 UTC | srp/srp_grps.h: make it Compaq C-friendly. PR: 3165 Submitted by: Daniel Richard G. (cherry picked from commit 2df9ec01d563f9cc2deab07e8c3391059d476592) (cherry picked from commit 0de70011adf6952e3b975d1a8a383879b64f3b77) | 12 November 2013, 21:20:45 UTC |
00fadef | Andy Polyakov | 12 November 2013, 20:59:01 UTC | modes/asm/ghash-alpha.pl: update from HEAD. PR: 3165 (cherry picked from commit 220d1e5353409d9af938111b22d6b58e6a42f633) | 12 November 2013, 21:01:31 UTC |
7ed244a | Andy Polyakov | 12 November 2013, 20:49:15 UTC | Make Makefiles OSF-make-friendly. PR: 3165 (cherry picked from commit d1cf23ac86c05b22b8780e2c03b67230564d2d34) | 12 November 2013, 21:01:20 UTC |
e94a238 | Dr. Stephen Henson | 11 November 2013, 22:39:40 UTC | Fix memory leak. (cherry picked from commit 16bc45ba956fdf07c7cda7feda88de597569df63) | 11 November 2013, 23:55:40 UTC |
041f681 | Dr. Stephen Henson | 11 November 2013, 22:24:08 UTC | Typo. (cherry picked from commit 5c50462e1e23eeb6d91e1e5311f5da0b79b04fb4) | 11 November 2013, 22:24:40 UTC |
afec9f5 | Andy Polyakov | 10 November 2013, 22:06:41 UTC | Makefile.org: make FIPS build work with BSD make. (cherry picked from commit 60adefa61025ffd7d56cf7ff8491008f783282bf) | 10 November 2013, 22:08:25 UTC |
0ec1a77 | Dr. Stephen Henson | 07 November 2013, 15:15:20 UTC | Check for missing components in RSA_check. (cherry picked from commit 01be36ef70525e81fc358d2e559bdd0a0d9427a5) | 09 November 2013, 15:09:21 UTC |
62c2b6d | Dr. Stephen Henson | 07 November 2013, 17:27:07 UTC | Document RSAPublicKey_{in,out} options. (cherry picked from commit 7040d73d22987532faa503630d6616cf2788c975) | 09 November 2013, 15:09:21 UTC |
5b98979 | Andy Polyakov | 08 November 2013, 22:00:35 UTC | engines/ccgost/gost89.h: make word32 defintion unconditional. Original definition depended on __LONG_MAX__ that is not guaranteed to be present. As we don't support platforms with int narrower that 32 bits it's appropriate to make defition inconditional. PR: 3165 (cherry picked from commit 96180cac04591abfe50fc86096365553484bde65) | 08 November 2013, 22:09:26 UTC |
9abbf5c | Andy Polyakov | 08 November 2013, 21:56:44 UTC | modes/asm/ghash-alpha.pl: make it work with older assembler. PR: 3165 (cherry picked from commit d24d1d7daf515aa19fbf18f6371e3e617028a07c) | 08 November 2013, 22:09:13 UTC |
ddfe486 | Dr. Stephen Henson | 06 November 2013, 14:38:28 UTC | Enable PSK in FIPS mode. Enable PSK ciphersuites with AES or DES3 in FIPS mode. (cherry picked from commit e0ffd129c16af90eb5e2ce54e57832c0046d1aaf) | 06 November 2013, 14:40:01 UTC |
834d30b | Dr. Stephen Henson | 06 November 2013, 13:16:50 UTC | Initialise context before using it. (cherry picked from commit a4947e4e064d2d5bb622ac64cf13edc4a46ed196) | 06 November 2013, 13:19:23 UTC |
e26faa9 | Ben Laurie | 03 November 2013, 17:23:50 UTC | PBKDF2 should be efficient. Contributed by Christian Heimes <christian@python.org>. | 03 November 2013, 17:33:54 UTC |
025f7db | Robin Seggelmann | 09 May 2012, 17:28:41 UTC | DTLS/SCTP Finished Auth Bug PR: 2808 With DTLS/SCTP the SCTP extension SCTP-AUTH is used to protect DATA and FORWARD-TSN chunks. The key for this extension is derived from the master secret and changed with the next ChangeCipherSpec, whenever a new key has been negotiated. The following Finished then already uses the new key. Unfortunately, the ChangeCipherSpec and Finished are part of the same flight as the ClientKeyExchange, which is necessary for the computation of the new secret. Hence, these messages are sent immediately following each other, leaving the server very little time to compute the new secret and pass it to SCTP before the finished arrives. So the Finished is likely to be discarded by SCTP and a retransmission becomes necessary. To prevent this issue, the Finished of the client is still sent with the old key. (cherry picked from commit 9fb523adce6fd6015b68da2ca8e4ac4900ac2be2) (cherry picked from commit b9ef52b07897f249a9fa44943dba33fba8fb2721) | 01 November 2013, 22:44:20 UTC |
44f4934 | Robin Seggelmann | 09 May 2012, 17:28:44 UTC | DTLS/SCTP struct authchunks Bug PR: 2809 DTLS/SCTP requires DATA and FORWARD-TSN chunks to be protected with SCTP-AUTH. It is checked if this has been activated successfully for the local and remote peer. Due to a bug, however, the gauth_number_of_chunks field of the authchunks struct is missing on FreeBSD, and was therefore not considered in the OpenSSL implementation. This patch sets the corresponding pointer for the check correctly whether or not this bug is present. (cherry picked from commit f596e3c491035fe80db5fc0c3ff6b647662b0003) (cherry picked from commit b8140811367f6e1ef13afa6ffe9625309c46946c) | 01 November 2013, 22:44:06 UTC |
453ca70 | Nick Mathewson | 20 October 2013, 22:08:58 UTC | Fix another gmt_unix_time case in server_random | 20 October 2013, 22:14:40 UTC |
5e1ff66 | Dr. Stephen Henson | 15 October 2013, 13:15:54 UTC | Don't use RSA+MD5 with TLS 1.2 Since the TLS 1.2 supported signature algorithms extension is less sophisticaed in OpenSSL 1.0.1 this has to be done in two stages. RSA+MD5 is removed from supported signature algorithms extension: any compliant implementation should never use RSA+MD5 as a result. To cover the case of a broken implementation using RSA+MD5 anyway disable lookup of MD5 algorithm in TLS 1.2. | 20 October 2013, 11:23:27 UTC |
833a896 | Ben Laurie | 19 October 2013, 11:37:15 UTC | More cleanup. | 19 October 2013, 11:37:15 UTC |
34e43b9 | Ben Laurie | 19 October 2013, 11:34:15 UTC | Cleanup. | 19 October 2013, 11:34:15 UTC |
62036c6 | Ben Laurie | 19 October 2013, 10:46:32 UTC | Merge branch 'no_gmt_unix_time' of git://github.com/nmathewson/openssl into OpenSSL_1_0_1-stable | 19 October 2013, 10:46:32 UTC |
68dd851 | Andy Polyakov | 13 October 2013, 11:14:52 UTC | MIPS assembly pack: get rid of deprecated instructions. Latest MIPS ISA specification declared 'branch likely' instructions obsolete. To makes code future-proof replace them with equivalent. (cherry picked from commit 0c2adb0a9be76da8de9bbfd5377215f71711a52e) | 13 October 2013, 11:19:12 UTC |
bbf9f3c | Andy Polyakov | 12 October 2013, 19:47:54 UTC | aes/asm/bsaes-x86_64.pl: update from master. Performance improvement and Windows-specific bugfix (PR#3139). (cherry picked from commit 9ed6fba2b4685ced2340feff03da5a12ed14b003) | 12 October 2013, 19:50:15 UTC |
2583270 | Nick Mathewson | 09 October 2013, 14:37:53 UTC | Control sending time with SSL_SEND_{CLIENT,SERVER}RANDOM_MODE (I'd rather use an option, but it appears that the options field is full.) Now, we send the time in the gmt_unix_time field if the appropriate one of these mode options is set, but randomize the field if the flag is not set. | 09 October 2013, 14:37:53 UTC |
3da721d | Nick Mathewson | 09 October 2013, 14:28:42 UTC | Refactor {client,server}_random to call an intermediate function I'll be using this to make an option for randomizing the time. | 09 October 2013, 14:28:42 UTC |
eb22b7e | Andy Polyakov | 03 October 2013, 08:55:49 UTC | evp/e_des3.c: fix typo with potential integer overflow on 32-bit platforms. Submitted by: Yuriy Kaminskiy (cherry picked from commit 524b00c0da42b129ed8622dfb3f5eab9cc5d6617) Resolved conflicts: crypto/evp/e_des3.c | 03 October 2013, 09:11:44 UTC |
b939161 | Ben Laurie | 01 October 2013, 13:51:04 UTC | Constification. | 01 October 2013, 13:53:18 UTC |
82f42a1 | Dr. Stephen Henson | 17 July 2013, 13:19:40 UTC | Typo. (cherry picked from commit 415ece73015a0e24ea934ecfb857d022952bb65b) | 30 September 2013, 13:20:42 UTC |
a4870de | Dr. Stephen Henson | 16 September 2013, 04:23:44 UTC | Disable Dual EC DRBG. Return an error if an attempt is made to enable the Dual EC DRBG: it is not used by default. | 22 September 2013, 17:24:12 UTC |
39aabe5 | Dr. Stephen Henson | 16 September 2013, 05:12:00 UTC | Fix warning. | 22 September 2013, 17:24:12 UTC |
f4c93b4 | Nick Mathewson | 16 September 2013, 17:32:54 UTC | Do not include a timestamp in the ServerHello Random field. Instead, send random bytes. | 16 September 2013, 17:44:10 UTC |